Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 09:57
Static task
static1
Behavioral task
behavioral1
Sample
7f8b6bfea320f0414a90aca8685e4127.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7f8b6bfea320f0414a90aca8685e4127.exe
Resource
win10v2004-20231222-en
General
-
Target
7f8b6bfea320f0414a90aca8685e4127.exe
-
Size
183KB
-
MD5
7f8b6bfea320f0414a90aca8685e4127
-
SHA1
00f57008c94feca19fd903f0bcdbe437aa554ba8
-
SHA256
5ba47c52b9f1029e4f602c4cf170d8aeef5bb435405d8559c0ce94b46b1a55b3
-
SHA512
b48c28b1b9d14909f4ec00620c3803c9b07444a62a21c43ac56a1b60485643abe72bc69e73ba8c7b5ff01f8aab3c0980537fd2b995d6f45a97122e4ae952e0c6
-
SSDEEP
3072:yKdAWkTthrHwvxiIe91s+n3p/5e8jR0cTs/w+VLXKr6vkvs9R8igyQfgEOBeOB03:hwQvXoim363/OG58dyQIpX
Malware Config
Signatures
-
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral1/memory/1760-2-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral1/memory/1760-4-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral1/memory/1760-3-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral1/memory/1760-7-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral1/memory/2320-29-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral1/memory/2320-28-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral1/memory/2320-32-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2320 svchsot.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXX7A3F0DDD = "C:\\Windows\\XXXXXX7A3F0DDD\\svchsot.exe" 7f8b6bfea320f0414a90aca8685e4127.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXX7A3F0DDD = "C:\\Windows\\XXXXXX7A3F0DDD\\svchsot.exe" svchsot.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\XXXXXX7A3F0DDD\JH.BAT 7f8b6bfea320f0414a90aca8685e4127.exe File created C:\Windows\XXXXXX7A3F0DDD\svchsot.exe svchsot.exe File created C:\Windows\XXXXXX7A3F0DDD\JH.BAT svchsot.exe File created C:\Windows\XXXXXX7A3F0DDD\svchsot.exe 7f8b6bfea320f0414a90aca8685e4127.exe File opened for modification C:\Windows\XXXXXX7A3F0DDD\svchsot.exe 7f8b6bfea320f0414a90aca8685e4127.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2748 sc.exe 2056 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1760 7f8b6bfea320f0414a90aca8685e4127.exe 1760 7f8b6bfea320f0414a90aca8685e4127.exe 1760 7f8b6bfea320f0414a90aca8685e4127.exe 1760 7f8b6bfea320f0414a90aca8685e4127.exe 2320 svchsot.exe 2320 svchsot.exe 2320 svchsot.exe 2320 svchsot.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2728 1760 7f8b6bfea320f0414a90aca8685e4127.exe 28 PID 1760 wrote to memory of 2728 1760 7f8b6bfea320f0414a90aca8685e4127.exe 28 PID 1760 wrote to memory of 2728 1760 7f8b6bfea320f0414a90aca8685e4127.exe 28 PID 1760 wrote to memory of 2728 1760 7f8b6bfea320f0414a90aca8685e4127.exe 28 PID 2728 wrote to memory of 2124 2728 cmd.exe 30 PID 2728 wrote to memory of 2124 2728 cmd.exe 30 PID 2728 wrote to memory of 2124 2728 cmd.exe 30 PID 2728 wrote to memory of 2124 2728 cmd.exe 30 PID 2728 wrote to memory of 2748 2728 cmd.exe 33 PID 2728 wrote to memory of 2748 2728 cmd.exe 33 PID 2728 wrote to memory of 2748 2728 cmd.exe 33 PID 2728 wrote to memory of 2748 2728 cmd.exe 33 PID 2728 wrote to memory of 2612 2728 cmd.exe 31 PID 2728 wrote to memory of 2612 2728 cmd.exe 31 PID 2728 wrote to memory of 2612 2728 cmd.exe 31 PID 2728 wrote to memory of 2612 2728 cmd.exe 31 PID 2612 wrote to memory of 2652 2612 net.exe 32 PID 2612 wrote to memory of 2652 2612 net.exe 32 PID 2612 wrote to memory of 2652 2612 net.exe 32 PID 2612 wrote to memory of 2652 2612 net.exe 32 PID 2728 wrote to memory of 2656 2728 cmd.exe 34 PID 2728 wrote to memory of 2656 2728 cmd.exe 34 PID 2728 wrote to memory of 2656 2728 cmd.exe 34 PID 2728 wrote to memory of 2656 2728 cmd.exe 34 PID 2728 wrote to memory of 2712 2728 cmd.exe 35 PID 2728 wrote to memory of 2712 2728 cmd.exe 35 PID 2728 wrote to memory of 2712 2728 cmd.exe 35 PID 2728 wrote to memory of 2712 2728 cmd.exe 35 PID 2728 wrote to memory of 2620 2728 cmd.exe 36 PID 2728 wrote to memory of 2620 2728 cmd.exe 36 PID 2728 wrote to memory of 2620 2728 cmd.exe 36 PID 2728 wrote to memory of 2620 2728 cmd.exe 36 PID 2728 wrote to memory of 2720 2728 cmd.exe 37 PID 2728 wrote to memory of 2720 2728 cmd.exe 37 PID 2728 wrote to memory of 2720 2728 cmd.exe 37 PID 2728 wrote to memory of 2720 2728 cmd.exe 37 PID 2728 wrote to memory of 2064 2728 cmd.exe 38 PID 2728 wrote to memory of 2064 2728 cmd.exe 38 PID 2728 wrote to memory of 2064 2728 cmd.exe 38 PID 2728 wrote to memory of 2064 2728 cmd.exe 38 PID 2728 wrote to memory of 2580 2728 cmd.exe 39 PID 2728 wrote to memory of 2580 2728 cmd.exe 39 PID 2728 wrote to memory of 2580 2728 cmd.exe 39 PID 2728 wrote to memory of 2580 2728 cmd.exe 39 PID 2728 wrote to memory of 2792 2728 cmd.exe 40 PID 2728 wrote to memory of 2792 2728 cmd.exe 40 PID 2728 wrote to memory of 2792 2728 cmd.exe 40 PID 2728 wrote to memory of 2792 2728 cmd.exe 40 PID 2728 wrote to memory of 2308 2728 cmd.exe 41 PID 2728 wrote to memory of 2308 2728 cmd.exe 41 PID 2728 wrote to memory of 2308 2728 cmd.exe 41 PID 2728 wrote to memory of 2308 2728 cmd.exe 41 PID 2728 wrote to memory of 2632 2728 cmd.exe 42 PID 2728 wrote to memory of 2632 2728 cmd.exe 42 PID 2728 wrote to memory of 2632 2728 cmd.exe 42 PID 2728 wrote to memory of 2632 2728 cmd.exe 42 PID 2728 wrote to memory of 2288 2728 cmd.exe 43 PID 2728 wrote to memory of 2288 2728 cmd.exe 43 PID 2728 wrote to memory of 2288 2728 cmd.exe 43 PID 2728 wrote to memory of 2288 2728 cmd.exe 43 PID 2728 wrote to memory of 2480 2728 cmd.exe 44 PID 2728 wrote to memory of 2480 2728 cmd.exe 44 PID 2728 wrote to memory of 2480 2728 cmd.exe 44 PID 2728 wrote to memory of 2480 2728 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f8b6bfea320f0414a90aca8685e4127.exe"C:\Users\Admin\AppData\Local\Temp\7f8b6bfea320f0414a90aca8685e4127.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\XXXXXX7A3F0DDD\JH.BAT2⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵PID:2124
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"3⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"4⤵PID:2652
-
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
PID:2748
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2656
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2712
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2620
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2720
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2064
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2580
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2792
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2308
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2632
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2288
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2480
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2536
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2516
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2924
-
-
C:\Windows\SysWOW64\at.exeAt 14:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2156
-
-
C:\Windows\SysWOW64\at.exeAt 15:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2936
-
-
C:\Windows\SysWOW64\at.exeAt 16:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:1728
-
-
C:\Windows\SysWOW64\at.exeAt 17:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2812
-
-
C:\Windows\SysWOW64\at.exeAt 18:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:1836
-
-
C:\Windows\SysWOW64\at.exeAt 19:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2324
-
-
C:\Windows\SysWOW64\at.exeAt 20:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2452
-
-
C:\Windows\SysWOW64\at.exeAt 21:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:1652
-
-
C:\Windows\SysWOW64\at.exeAt 22:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:2784
-
-
C:\Windows\SysWOW64\at.exeAt 23:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:1452
-
-
C:\Windows\SysWOW64\at.exeAt 24:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe3⤵PID:868
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {70DD2379-2B5A-42C4-BDC1-C350EFEF3C52} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:668
-
C:\Windows\XXXXXX7A3F0DDD\svchsot.exeC:\Windows\XXXXXX7A3F0DDD\svchsot.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\XXXXXX7A3F0DDD\JH.BAT3⤵PID:3036
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto4⤵
- Launches sc.exe
PID:2056
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2380
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2040
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2304
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:1704
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:1644
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2572
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"4⤵PID:828
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2748
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2708
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2044
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2712
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2704
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:1700
-
-
C:\Windows\SysWOW64\at.exeAt 14:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2488
-
-
C:\Windows\SysWOW64\at.exeAt 16:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2508
-
-
C:\Windows\SysWOW64\at.exeAt 17:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2468
-
-
C:\Windows\SysWOW64\at.exeAt 18:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2496
-
-
C:\Windows\SysWOW64\at.exeAt 19:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2584
-
-
C:\Windows\SysWOW64\at.exeAt 20:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2772
-
-
C:\Windows\SysWOW64\at.exeAt 22:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:1972
-
-
C:\Windows\SysWOW64\at.exeAt 23:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:320
-
-
C:\Windows\SysWOW64\at.exeAt 24:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:1500
-
-
C:\Windows\SysWOW64\at.exeAt 21:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:3040
-
-
C:\Windows\SysWOW64\at.exeAt 15:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2628
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2716
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXX7A3F0DDD\svchsot.exe4⤵PID:2588
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f1⤵PID:1076
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"1⤵PID:2964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD534f391f0fecabdb0b1c7dcf94b63d9bd
SHA1755744fcbae194ee4c2543be99bde9ad9eb4edeb
SHA2564895989db870b44359e792deb72fcb91040cf221706b9afee877ac0d7a632315
SHA512be0434caf6367fc3df4acffb129a10767b6abea1e9fbfcedf8bab754afc81db5b700ae0ef22a55b35e1e0e309ffa4ca3a5862deedc9897bdb54c32da82035507
-
Filesize
183KB
MD57f8b6bfea320f0414a90aca8685e4127
SHA100f57008c94feca19fd903f0bcdbe437aa554ba8
SHA2565ba47c52b9f1029e4f602c4cf170d8aeef5bb435405d8559c0ce94b46b1a55b3
SHA512b48c28b1b9d14909f4ec00620c3803c9b07444a62a21c43ac56a1b60485643abe72bc69e73ba8c7b5ff01f8aab3c0980537fd2b995d6f45a97122e4ae952e0c6